CVE-2017-1000086
05.10.2017, 01:29
The Periodic Backup Plugin did not perform any permission checks, allowing any user with Overall/Read access to change its settings, trigger backups, restore backups, download backups, and also delete all previous backups via log rotation. Additionally, the plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks.Enginsight
Vendor | Product | Version |
---|---|---|
jenkins | periodic_backup | 1.0 |
jenkins | periodic_backup | 1.1 |
jenkins | periodic_backup | 1.2 |
jenkins | periodic_backup | 1.3 |
jenkins | periodic_backup | 1.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration